Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
66.249.66.82 spambotsattack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2023-02-18 16:13:23
66.249.66.82 attackspam
Automatic report - Banned IP Access
2020-09-20 02:00:46
66.249.66.81 attackbotsspam
66.249.66.81 - - [19/Sep/2020:08:10:35 +0200] "GET /info/wp-login.php HTTP/1.1" 404 4264 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.110 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2020-09-19 23:59:44
66.249.66.157 attackspam
Automatic report - Banned IP Access
2020-09-19 22:53:34
66.249.66.82 attack
Automatic report - Banned IP Access
2020-09-19 17:53:19
66.249.66.81 attackbotsspam
66.249.66.81 - - [19/Sep/2020:08:10:35 +0200] "GET /info/wp-login.php HTTP/1.1" 404 4264 "-" "Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.110 Mobile Safari/537.36 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
2020-09-19 15:48:57
66.249.66.157 attack
Automatic report - Banned IP Access
2020-09-19 14:43:46
66.249.66.81 attackspambots
Automatic report - Banned IP Access
2020-09-19 07:23:27
66.249.66.157 attack
Automatic report - Banned IP Access
2020-09-19 06:20:01
66.249.66.219 attackspam
Automatic report - Banned IP Access
2020-09-08 03:08:18
66.249.66.219 attackspam
Automatic report - Banned IP Access
2020-09-07 18:37:09
66.249.66.207 attack
Automatic report - Banned IP Access
2020-09-01 07:45:23
66.249.66.138 attackbots
Automatic report - Banned IP Access
2020-08-31 16:43:42
66.249.66.27 attackspambots
Automatic report - Banned IP Access
2020-08-27 12:27:16
66.249.66.220 attackspambots
Automatic report - Banned IP Access
2020-08-27 03:06:14
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       66.249.64.0 - 66.249.95.255
CIDR:           66.249.64.0/19
NetName:        GOOGLE
NetHandle:      NET-66-249-64-0-1
Parent:         NET66 (NET-66-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Google LLC (GOGL)
RegDate:        2004-03-05
Updated:        2012-02-24
Ref:            https://rdap.arin.net/registry/ip/66.249.64.0



OrgName:        Google LLC
OrgId:          GOGL
Address:        1600 Amphitheatre Parkway
City:           Mountain View
StateProv:      CA
PostalCode:     94043
Country:        US
RegDate:        2000-03-30
Updated:        2019-10-31
Comment:        Please note that the recommended way to file abuse complaints are located in the following links. 
Comment:        
Comment:        To report abuse and illegal activity: https://www.google.com/contact/
Comment:        
Comment:        For legal requests: http://support.google.com/legal 
Comment:        
Comment:        Regards, 
Comment:        The Google Team
Ref:            https://rdap.arin.net/registry/entity/GOGL


OrgTechHandle: ZG39-ARIN
OrgTechName:   Google LLC
OrgTechPhone:  +1-650-253-0000 
OrgTechEmail:  arin-contact@google.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZG39-ARIN

OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-650-253-0000 
OrgAbuseEmail:  network-abuse@google.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE5250-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 66.249.66.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23557
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;66.249.66.64.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092600 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 27 00:01:04 CST 2025
;; MSG SIZE  rcvd: 105
Host info
64.66.249.66.in-addr.arpa domain name pointer crawl-66-249-66-64.googlebot.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.66.249.66.in-addr.arpa	name = crawl-66-249-66-64.googlebot.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.248.174.216 attackbots
89.248.174.216 was recorded 7 times by 5 hosts attempting to connect to the following ports: 53413. Incident counter (4h, 24h, all-time): 7, 47, 2369
2020-04-27 05:44:03
129.204.71.16 attack
Apr 26 23:48:13 ns381471 sshd[31880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.71.16
Apr 26 23:48:15 ns381471 sshd[31880]: Failed password for invalid user gpas from 129.204.71.16 port 43792 ssh2
2020-04-27 05:48:50
138.68.81.162 attack
2020-04-26T23:51:39.111300sd-86998 sshd[14443]: Invalid user kristof from 138.68.81.162 port 55994
2020-04-26T23:51:39.114482sd-86998 sshd[14443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.81.162
2020-04-26T23:51:39.111300sd-86998 sshd[14443]: Invalid user kristof from 138.68.81.162 port 55994
2020-04-26T23:51:41.389967sd-86998 sshd[14443]: Failed password for invalid user kristof from 138.68.81.162 port 55994 ssh2
2020-04-26T23:57:06.057635sd-86998 sshd[14971]: Invalid user pma from 138.68.81.162 port 36950
...
2020-04-27 06:01:37
45.238.23.106 attack
2020-04-2622:37:291jSo1e-00081Q-CP\<=info@whatsup2013.chH=\(localhost\)[205.217.246.45]:44553P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3158id=0cafde0f042ffa092ad422717aae97bb98726a7761@whatsup2013.chT="Pleasesparkmyheart."forgabrielsanchez106@yahoo.comcadenwhitehead48@gmail.com2020-04-2622:39:181jSo3Y-0008BH-6C\<=info@whatsup2013.chH=\(localhost\)[206.214.6.33]:42175P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3193id=0eadaf7c775c897a59a7510209dde4c8eb01e82e5f@whatsup2013.chT="Seekingmybesthalf"forponyboy86@yahoo.comarmandosanchez19@gmail.com2020-04-2622:37:501jSo29-00089E-Fc\<=info@whatsup2013.chH=\(localhost\)[116.104.246.25]:38693P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3103id=0fb18eddd6fd28240346f0a357909a96a56ab973@whatsup2013.chT="Iadoreyourphotos"forjustinbrewster147@yahoo.comhamm21joshua@gmail.com2020-04-2622:39:411jSo3q-0008FB-8E\<=info@whatsup2013.chH=
2020-04-27 05:37:45
205.217.246.45 attackbots
2020-04-2622:37:291jSo1e-00081Q-CP\<=info@whatsup2013.chH=\(localhost\)[205.217.246.45]:44553P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3158id=0cafde0f042ffa092ad422717aae97bb98726a7761@whatsup2013.chT="Pleasesparkmyheart."forgabrielsanchez106@yahoo.comcadenwhitehead48@gmail.com2020-04-2622:39:181jSo3Y-0008BH-6C\<=info@whatsup2013.chH=\(localhost\)[206.214.6.33]:42175P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3193id=0eadaf7c775c897a59a7510209dde4c8eb01e82e5f@whatsup2013.chT="Seekingmybesthalf"forponyboy86@yahoo.comarmandosanchez19@gmail.com2020-04-2622:37:501jSo29-00089E-Fc\<=info@whatsup2013.chH=\(localhost\)[116.104.246.25]:38693P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3103id=0fb18eddd6fd28240346f0a357909a96a56ab973@whatsup2013.chT="Iadoreyourphotos"forjustinbrewster147@yahoo.comhamm21joshua@gmail.com2020-04-2622:39:411jSo3q-0008FB-8E\<=info@whatsup2013.chH=
2020-04-27 05:40:43
103.242.56.182 attack
(sshd) Failed SSH login from 103.242.56.182 (KH/Cambodia/-): 5 in the last 3600 secs
2020-04-27 05:45:25
142.93.48.216 attack
Automatic report - XMLRPC Attack
2020-04-27 05:58:59
141.98.81.81 attackbots
Apr 26 17:56:09 firewall sshd[24211]: Invalid user 1234 from 141.98.81.81
Apr 26 17:56:11 firewall sshd[24211]: Failed password for invalid user 1234 from 141.98.81.81 port 33430 ssh2
Apr 26 17:56:44 firewall sshd[24270]: Invalid user user from 141.98.81.81
...
2020-04-27 05:50:49
141.98.81.84 attackspambots
Invalid user admin from 141.98.81.84 port 34351
2020-04-27 06:01:08
167.172.115.84 attack
Bruteforce detected by fail2ban
2020-04-27 05:50:19
116.98.54.212 attack
Try to hack  Email.
2020-04-27 05:43:57
218.92.0.191 attackbotsspam
Apr 26 23:53:38 sip sshd[9832]: Failed password for root from 218.92.0.191 port 56664 ssh2
Apr 26 23:53:40 sip sshd[9832]: Failed password for root from 218.92.0.191 port 56664 ssh2
Apr 26 23:53:44 sip sshd[9832]: Failed password for root from 218.92.0.191 port 56664 ssh2
...
2020-04-27 05:57:45
46.101.223.54 attack
firewall-block, port(s): 23606/tcp
2020-04-27 05:52:10
122.51.206.41 attack
Apr 26 20:30:17 ip-172-31-62-245 sshd\[11602\]: Failed password for root from 122.51.206.41 port 55432 ssh2\
Apr 26 20:34:48 ip-172-31-62-245 sshd\[11655\]: Invalid user mm from 122.51.206.41\
Apr 26 20:34:50 ip-172-31-62-245 sshd\[11655\]: Failed password for invalid user mm from 122.51.206.41 port 54470 ssh2\
Apr 26 20:39:27 ip-172-31-62-245 sshd\[11801\]: Invalid user char from 122.51.206.41\
Apr 26 20:39:29 ip-172-31-62-245 sshd\[11801\]: Failed password for invalid user char from 122.51.206.41 port 53506 ssh2\
2020-04-27 06:00:33
218.78.87.25 attackbotsspam
Apr 26 23:04:42 OPSO sshd\[16264\]: Invalid user ss from 218.78.87.25 port 34430
Apr 26 23:04:42 OPSO sshd\[16264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.87.25
Apr 26 23:04:44 OPSO sshd\[16264\]: Failed password for invalid user ss from 218.78.87.25 port 34430 ssh2
Apr 26 23:07:04 OPSO sshd\[17251\]: Invalid user fan from 218.78.87.25 port 49674
Apr 26 23:07:04 OPSO sshd\[17251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.87.25
2020-04-27 05:32:47

Recently Reported IPs

113.219.218.197 172.236.0.89 4.150.191.6 110.77.169.86
110.77.169.48 35.94.245.28 20.112.233.74 18.232.176.94
162.129.36.175 172.202.105.96 18.212.193.181 92.246.87.64
113.215.188.118 14.212.94.64 23.185.120.114 42.236.101.196
13.221.44.232 165.154.243.26 165.154.238.102 59.34.28.139